====================================== | [ 2.736033] #PF: supervisor write access in kernel mode | [ 2.736068] #PF: error_code(0x0002) - not-present page | [ 2.736097] PGD 89df067 P4D 89df067 PUD 89de067 PMD 0 | [ 2.736133] Oops: Oops: 0002 [#1] SMP [ 2.736223] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 2.736265] RIP: 0010:work_grab_pending (./arch/x86/include/asm/bitops.h:136 ./include/asm-generic/bitops/instrumented-atomic.h:72 kernel/workqueue.c:2072 kernel/workqueue.c:2160) [ 2.736310] Code: 83 e6 01 41 57 41 56 4c 8d 77 20 41 55 41 54 41 89 f4 55 48 89 d5 53 48 89 fb 9c 58 fa 48 89 45 00 45 85 e4 0f 85 8a 00 00 00 48 0f ba 2b 00 41 0f 92 c5 72 0e 5b 44 89 e8 5d 41 5c 41 5d 41 All code ======== 0: 83 e6 01 and $0x1,%esi 3: 41 57 push %r15 5: 41 56 push %r14 7: 4c 8d 77 20 lea 0x20(%rdi),%r14 b: 41 55 push %r13 d: 41 54 push %r12 f: 41 89 f4 mov %esi,%r12d 12: 55 push %rbp 13: 48 89 d5 mov %rdx,%rbp 16: 53 push %rbx 17: 48 89 fb mov %rdi,%rbx 1a: 9c pushf 1b: 58 pop %rax 1c: fa cli 1d: 48 89 45 00 mov %rax,0x0(%rbp) 21: 45 85 e4 test %r12d,%r12d 24: 0f 85 8a 00 00 00 jne 0xb4 2a:* f0 48 0f ba 2b 00 lock btsq $0x0,(%rbx) <-- trapping instruction 30: 41 0f 92 c5 setb %r13b 34: 72 0e jb 0x44 36: 5b pop %rbx 37: 44 89 e8 mov %r13d,%eax 3a: 5d pop %rbp 3b: 41 5c pop %r12 3d: 41 5d pop %r13 3f: 41 rex.B Code starting with the faulting instruction =========================================== 0: f0 48 0f ba 2b 00 lock btsq $0x0,(%rbx) 6: 41 0f 92 c5 setb %r13b a: 72 0e jb 0x1a c: 5b pop %rbx d: 44 89 e8 mov %r13d,%eax 10: 5d pop %rbp 11: 41 5c pop %r12 13: 41 5d pop %r13 15: 41 rex.B [ 2.736455] RSP: 0018:ffff9a744034b770 EFLAGS: 00010046 [ 2.736495] RAX: 0000000000000246 RBX: 0000000000000000 RCX: ffff89640310a1a8 [ 2.736558] RDX: ffff9a744034b7a8 RSI: 0000000000000000 RDI: 0000000000000000 [ 2.736620] RBP: ffff9a744034b7a8 R08: 0000000000000001 R09: 0000000000000001 [ 2.736683] R10: ffffffff99a080d8 R11: ffff9a7440110ff8 R12: 0000000000000000 [ 2.736738] R13: 0000000000000000 R14: 0000000000000020 R15: 0000000000000001 [ 2.736793] FS: 00007f2447304800(0000) GS:ffff8964a2ada000(0000) knlGS:0000000000000000 [ 2.736851] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2.736908] CR2: 0000000000000000 CR3: 0000000008a34002 CR4: 0000000000772ef0 [ 2.736963] PKRU: 55555554 [ 2.736985] Call Trace: [ 2.737004] [ 2.737029] __cancel_work (kernel/workqueue.c:4366) [ 2.737059] __cancel_work_sync (kernel/workqueue.c:4381) [ 2.737092] __dev_close_many (net/core/dev.c:1879 (discriminator 2) net/core/dev.c:1932 (discriminator 2)) [ 2.737125] __dev_change_flags (./include/linux/list.h:226 ./include/linux/list.h:237 net/core/dev.c:1945 net/core/dev.c:9924) [ 2.737158] netif_change_flags (net/core/dev.c:9989) [ 2.737189] dev_change_flags (./include/net/netdev_lock.h:30 ./include/net/netdev_lock.h:47 net/core/dev_api.c:69) [ 2.737216] cycle_netdev (drivers/net/vrf.c:1052) vrf [ 2.737248] vrf_add_slave (drivers/net/vrf.c:1083 drivers/net/vrf.c:1102) vrf [ 2.737281] do_set_master (./include/net/netdev_lock.h:30 ./include/net/netdev_lock.h:41 net/core/rtnetlink.c:2964) [ 2.737314] rtnl_newlink (net/core/rtnetlink.c:3854 net/core/rtnetlink.c:3957 net/core/rtnetlink.c:4072) [ 2.737349] ? rtnl_setlink (net/core/rtnetlink.c:3963) [ 2.737387] rtnetlink_rcv_msg (net/core/rtnetlink.c:6959) [ 2.737420] ? update_load_avg (kernel/sched/fair.c:4731) [ 2.737452] ? rtnl_calcit.isra.0 (net/core/rtnetlink.c:6861) [ 2.737493] netlink_rcv_skb (net/netlink/af_netlink.c:2550) [ 2.737527] netlink_unicast (net/netlink/af_netlink.c:1319 net/netlink/af_netlink.c:1344) [ 2.737558] ? __alloc_skb (net/core/skbuff.c:706) [ 2.737591] netlink_sendmsg (net/netlink/af_netlink.c:1894) [ 2.737623] ____sys_sendmsg (net/socket.c:727 net/socket.c:742 net/socket.c:2630) [ 2.737657] ? copy_msghdr_from_user (net/socket.c:2570) [ 2.737697] ___sys_sendmsg (net/socket.c:2686) [ 2.737730] ? __handle_mm_fault (mm/memory.c:5708 mm/memory.c:5850 mm/memory.c:4362 mm/memory.c:6195 mm/memory.c:6336) [ 2.737775] __sys_sendmsg (net/socket.c:2716) [ 2.737808] do_syscall_64 (arch/x86/entry/syscall_64.c:63 arch/x86/entry/syscall_64.c:94) [ 2.737840] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 2.737881] RIP: 0033:0x7f24474d21d7 [ 2.737915] Code: Unable to access opcode bytes at 0x7f24474d21ad. Code starting with the faulting instruction =========================================== [ 2.737963] RSP: 002b:00007ffcec86bd88 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2.738022] RAX: ffffffffffffffda RBX: 00007ffcec86c4b0 RCX: 00007f24474d21d7 [ 2.738075] RDX: 0000000000000000 RSI: 00007ffcec86bdf0 RDI: 0000000000000005 [ 2.738134] RBP: 0000000000000002 R08: 0000000000000054 R09: 0000000000000000 [ 2.738186] R10: 00007f2447560ac0 R11: 0000000000000246 R12: 00007ffcec86c4f8 Finger prints: work_grab_pending:__cancel_work:__cancel_work_sync:__dev_close_many:__dev_change_flags